Key pre-distribution in wireless sensor networks using multivariate polynomials
2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., 2005Key agreement in sensor networks is a dif- ficult problem because of resource constraints of the sensors. The classical approaches used in general networks are impractical in sensor networks. Hence, several key pre-distribution schemes are proposed. In this paper, we propose a hypercube multivariate scheme (HMS) that is a threshold-based scheme. In the
F. Delgosha, F. Fekri
openaire +1 more source
An improved distributed key revocation scheme in wireless sensor networks
2008 11th IEEE International Conference on Communication Technology, 2008A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment ...
null Jun Zhou, null Mingxing He
openaire +1 more source
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, 2011Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network ...
Kevin Henry, Douglas R. Stinson
openaire +1 more source
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
2009A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users' joining and revocation operations by using secret sharing techniques and Modified Blom's symmetric key establishment mechanism.
Jun Zhou, Mingxing He
openaire +1 more source
ON MAXIMUM KEY POOL SIZE FOR A KEY PRE-DISTRIBUTION SCHEME IN WIRELESS SENSOR NETWORKS
International Journal of Computers and Applications, 2009AbstractBootstrapping secure communication among sensor nodes deployed in hostile environments is an important and challenging problem. A common approach to solve this problem is to use a key predistribution scheme in which each sensor node is assigned a subset of keys selected from some key pool. The resilience of a key pre-distribution scheme depends
N. Mittal, T.R. Belagodu
openaire +1 more source
Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network
2007 IEEE Wireless Communications and Networking Conference, 2007In this paper, we develop and analyze a new self-healing key distribution scheme with revocation capability, scalable to very large groups in unreliable ad hoc wireless environment. The main emphasis of our proposed scheme is that it has significant improvement in terms of both storage and communication overhead compared to the previous works.
Ratna Dutta, Sourav Mukhopadhyay
openaire +1 more source
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise and revelation. Therefore, establishing secure communication in such networks is of great importance necessitating utilization of efficient key distribution schemes.
H. Shafiei +4 more
openaire +1 more source
Key pre-distribution based secure backbone formation in wireless sensor networks
2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008Security is a prime concern in large-scale wireless sensor networks used for collaborative mission critical applications. A backbone network in the form of a cluster tree can enhance upper layer functions such as routing, broadcasting, in-network query processing and network management.
H. M. N. Dilum Bandara +2 more
openaire +1 more source
Three-dimensional Key Distribution Scheme in Wireless Sensor Networks
2022 18th International Conference on Mobility, Sensing and Networking (MSN), 2022Wanqing Wu +3 more
openaire +1 more source
Distributed Key Establishment Scheme in Wireless Sensor Network
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Zhao Hong-Wei +2 more
openaire +1 more source

